First published: Fri Jun 16 2023(Updated: )
A double free or use after free could occur after SSL_clear in OpenBSD 7.2 before errata 026 and 7.3 before errata 004, and in LibreSSL before 3.6.3 and 3.7.x before 3.7.3. NOTE: OpenSSL is not affected.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Libressl | <3.6.3 | |
Openbsd Libressl | >=3.7.0<3.7.3 | |
Openbsd Openbsd | =7.2 | |
Openbsd Openbsd | =7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35784 is a vulnerability that allows for a double free or use after free after SSL_clear in OpenBSD 7.2 before errata 026 and 7.3 before errata 004, and in LibreSSL before 3.6.3 and 3.7.x before 3.7.3.
Openbsd Libressl versions up to 3.6.3 and Openbsd Libressl versions 3.7.0 to 3.7.3, as well as Openbsd Openbsd versions 7.2 and 7.3 are affected by CVE-2023-35784.
CVE-2023-35784 has a severity rating of critical (9.8).
To fix CVE-2023-35784, users should update to OpenBSD 7.2 errata 026 or later, OpenBSD 7.3 errata 004 or later, LibreSSL 3.6.3 or later, or LibreSSL 3.7.3 or later.
More information about CVE-2023-35784 can be found in the OpenBSD LibreSSL release notes for versions 3.6.3 and 3.7.3, as well as the OpenBSD patches for 7.2 errata 026.